What is Project 1 virus and what is Project 1? What are the hazards? How can I get rid of it complet

Updated on healthy 2024-05-03
18 answers
  1. Anonymous users2024-02-08

    Project 1 Asked before.

    Consider to be a camouflage of a virus.

    Antivirus is recommended in safe mode.

    Reboot, press and hold F8, enter safe mode, and then launch the antivirus software from safe mode to easily kill virus.

    Also, please be sure to clean up your temporary folder "It is recommended to use Super Bunny to clean up system junk". More convenient".

    This is because there are a lot of virus main programs hidden in the temporary folder, and you can't completely delete them when you kill the virus.

    2006-8-10 Super Bunny.

    It is recommended that you use the latest version of the mainstream antivirus software in safe mode.

    There is today's latest Rising Star.

  2. Anonymous users2024-02-07

    Project 1 ? It's a strange name, and it doesn't usually have a virus called this kind of name...... right

    Maybe you're writing your own program, are you using a VB or something like that? If so, turn off the programming software and take a look, it should be gone.

    If this is not the case, and it is useless to use chizhenwei's method, it is a particularly cold "virus", which may not be able to kill many software, so try the following method: (follow the steps).

    1.Use Windows Optimizer or Super Bunny to delete the boot entry of "Project 1".

    2.Look in the registry to see if there is a "program1" or "engineering1" entry, and delete it if there is.

    4.It should be enough to clean up the registry with Windows Optimizer or Super Bunny.

  3. Anonymous users2024-02-06

    Trojan viruses or rogue software.

    You can find out with 360 Security Guard.

  4. Anonymous users2024-02-05

    It is estimated that the Trojan horse program will kill you with a Trojan horse, and it should be possible to detect and kill it.

  5. Anonymous users2024-02-04

    Remember, when you enter safe mode, you have to enter as an administrator so that your permissions are not restricted.

    2, if the enhanced version of ewido can't be killed, the next green version of Kaba will be killed.

  6. Anonymous users2024-02-03

    A computer virus is artificially inserted into a computer program to destroy computer functions or data, and it is a set of computer instructions or programs that can affect the use of a computer and can replicate itself.

    Computer viruses are multiply, destructive, infectious, latent, hidden, and triggerable.

  7. Anonymous users2024-02-02

    1. Introduction.

    Computer virus is clearly defined in the Regulations of the People's Republic of China on the Security Protection of Computer Information Systems, and refers to "a set of computer instructions or programs inserted into a computer program by the compiler that destroys computer functions or destroys data, affects the use of the computer and can replicate itself".

    Unlike medical "viruses", computer viruses are not naturally occurring, but are a set of instructions or programs that people compile to take advantage of the inherent vulnerabilities of computer software and hardware**. It can latent in the computer's storage medium (or program), activate when the conditions are met, and put an exact copy of itself or a possible evolution into another program by modifying other programs.

    The so-called virus is artificially caused and is very harmful to other users.

    2. Principle. Viruses attach to storage media, floppy disks, hard disks, etc., to form a source of infection. The vector of viral transmission depends on the environment in which you work. Virus activation is to put the virus in memory and set the trigger conditions, which can be a clock, the date of the system, the user identifier, or the system communication at one time, etc.

    When conditions are ripe, the virus begins to replicate itself into the infected object and carry out various sabotage activities.

    Viral contagion is an important indicator of viral performance. In the infectious process, the virus replicates a copy of itself into the infected object.

  8. Anonymous users2024-02-01

    A computer virus is a set of computer instructions or programs inserted by the compiler into a computer program that can destroy computer functions or data, affect the use of the computer, and can replicate itself. Computer viruses are transmissible, hidden, infectious, latent, excitable, expressive, or destructive.

    The life cycle of a computer virus: development period, infectious period, incubation period, attack period, discovery period, digestion period, and extinction period. A computer virus is a program that executes code.

    Just like biological viruses, they have the characteristics of biological viruses such as self-reproduction, mutual infection, and activation and regeneration.

    Features: 1. Reproduction.

    A computer virus can multiply like a biological virus, and when a normal program is running, it also replicates itself, and whether it has the characteristics of reproduction and infection is the primary condition for judging a certain program as a computer virus.

    2. Destructive.

    After computer poisoning, it may cause normal programs to fail to run, delete files in the computer or suffer damage to varying degrees. Destroy the boot sector and BIOS, and destroy the hardware environment.

    3. Infectious.

    Computer virus infectivity refers to the fact that a computer virus infects a copy or variant of itself to other non-toxic objects by modifying other programs, which can be a program or a part of the system.

  9. Anonymous users2024-01-31

    Hello, this is a web virus, it is generally in the temporary folder generated by the Internet, as long as you use 360 security guard and other optimization software to clean up the computer junk can remove this virus.

  10. Anonymous users2024-01-30

    These files are generally scripted viruses.

    or contain malicious intent embedded in malicious.

  11. Anonymous users2024-01-29

    Virus fooling around, install antivirus software, and safety first.

  12. Anonymous users2024-01-28

    To put it bluntly, this is an MBR virus that infects the main boot area of the hard drive. [The ghost virus is infected like this] [According to your description of the virus here, it should be called bootkit].

    If you want to kill, there is basically no way to attack this thing under normal circumstances, and most of the killing softs can't be killed. [That means don't trust the expert upstairs].

    In addition, let's briefly talk about the harm of this thing: this poison is equivalent to having obtained the underlying permissions of the system and can do almost anything.

  13. Anonymous users2024-01-27

    Hello, you can continue to ask on the computer manager platform, and we will solve this problem for you as soon as possible.

  14. Anonymous users2024-01-26

    This one could be a malicious adware. It is recommended that you follow the prompts of 360 antivirus software.

  15. Anonymous users2024-01-25

    File name : main[1].JS file size: 2863 bytes

    File Type : ASCII C++ Program Text, with very long lines, with crlf, cr

    md5 : 50a89c4b5f9b9805273928957a85f2eb

    sha1 : 8838fc1ef3b5e12dddde9e246c090c1723852c76

    The file itself is not poisonous, but it is possible to be trojanized, so it is recommended to kill it completely.

  16. Anonymous users2024-01-24

    I'm also a victim, but I'm going to share it with you, and for those of us who don't understand computers, it's uncomfortable to look at these reports, even if they're not viruses. Click "Check for Updates" at the bottom of the main antivirus interface to update the virus database once. Exit Antivirus and turn it on again to try again.

    Then let's take a look at it all and see if there's any.

  17. Anonymous users2024-01-23

    This file is an IE cache when browsing the web and may contain malicious information**.

  18. Anonymous users2024-01-22

    Malware is the meaning of malicious**,The back should be the number of the characteristic library given to it by your security software,Generally, these malware** can control your computer,Destroy your PC、Network,If you connect to the Internet, it will automatically connect with its terminal,In order to remotely control your computer,If you don't have a network, you won't,So you can find it when you connect to the network。 There are also some cases that are false positives, 360 vulnerabilities, are files used by some normal software to network the network, such as the automatic upgrade program of some software, because only 360 often reports this virus, it only says that it is malicious**, but it does not point out that it is a Trojan horse or a worm or something, it may also be a false positive, and Kaba, Jinshan, etc. are not.

Related questions
4 answers2024-05-03

Rotavirus (HRV) was discovered in 1973 by Bishop et al., and it is the main pathogen causing bacterial gastroenteritis in A,JL. The most common causative agent of acute gastroenteritis in winter, accounting for more than 50% of all intestinal infections**. According to the World Health Organization, rotavirus infection is responsible for 20% to 70% of hospitalized cases of diarrhea caused by all causes. >>>More

7 answers2024-05-03

In order to meet the challenges of the world's new technological revolution and face the 21st century, the 211 project is China's leading government and the local forces in all aspects, focusing on the construction of about 100 institutions of higher learning and a number of key disciplines and majors in phases and batches, and by the year 2000, there will be a great improvement in the quality of education, scientific research, management level and school-running efficiency, and there will be significant progress in educational reform, and strive to have a number of institutions of higher learning and disciplines at the beginning of the 21st century. The major is close to or has reached the level of a world-class university. The "211 Project" is the largest key construction project in the field of higher education officially approved by the state since the founding of the People's Republic of China, a development project of higher education during the period of the Ninth Five-Year Plan, and a systematic reform project of higher education. >>>More

11 answers2024-05-03

Marine engineering is an undergraduate major in ordinary colleges and universities, which is a major in transportation, and the basic study period is four years, which is awardedEngineering degree >>>More

17 answers2024-05-03

Safety engineering is an undergraduate major in China's ordinary colleges and universities. >>>More

15 answers2024-05-03

Competency sub-items. Description of specific capabilities. >>>More